Sciweavers

1610 search results - page 94 / 322
» Identity Based Multisignatures
Sort
View
ACISP
2008
Springer
15 years 9 months ago
Secure Biometric Authentication with Improved Accuracy
Abstract. We propose a new hybrid protocol for cryptographically secure biometric authentication. The main advantages of the proposed protocol over previous solutions can be summar...
Manuel Barbosa, Thierry Brouard, Stéphane C...
AIPR
2007
IEEE
15 years 9 months ago
Using a High-Fidelity Simulation Framework for Performance Singularity
A common way to evaluate the performance of a system is to compare the algorithmic outputs with ground truth to identify divergences in the system’s performance and discover the...
Chris Scrapper, Raj Madhavan, Stephen Balakirsky
ICNP
2007
IEEE
15 years 9 months ago
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
— In many traditional mobile network scenarios, nodes establish communication on the basis of persistent public identities. However, in some hostile and suspicious MANET settings...
Karim M. El Defrawy, Gene Tsudik
WACV
2007
IEEE
15 years 9 months ago
Facial Strain Pattern as a Soft Forensic Evidence
The success of forensic identification largely depends on the availability of strong evidence or traces that substantiate the prosecution hypothesis that a certain person is guil...
Vasant Manohar, Dmitry B. Goldgof, Sudeep Sarkar, ...
IPSN
2007
Springer
15 years 9 months ago
Blind calibration of sensor networks
This paper considers the problem of blindly calibrating sensor response using routine sensor network measurements. We show that as long as the sensors slightly oversample the sign...
Laura Balzano, Robert Nowak